Previous Page  6 / 44 Next Page
Information
Show Menu
Previous Page 6 / 44 Next Page
Page Background

ONINE SAFETY

When you’re in college, your computer and

mobile devices are primary tools in your

educational and social life. Students use

the Internet for homework, research, social

networking, online shopping and other activities.

The Internet is an amazing tool, but must be

used safely and securely.

When you log on to the campus network (or any

network), what you do online could impact not

only your computer, but other students and the

network as well. By combining up-to-date security

tools with good judgment, you and your college

community are much less likely to encounter

a security violation, loss of data, or system

problems.

Keep a Clean Machine

• Keep security software current: Having the

latest security software, web browser, and

operating system are the best defenses

against viruses, malware, and other online

threats.

• Automate software updates: Many software

programs will automatically connect and

update to defend against known risks. Turn

on automatic updates if that’s an available

option.

• Protect all devices that connect to the

Internet: Along with computers, smart

phones, gaming systems, and other web-

enabled devices also need protection from

viruses and malware.

• Plug & scan: “USBs” and other external

devices can be infected by viruses and

malware. Use your security software to scan

them.

Protect Your Personal Information

• Secure your accounts: Ask for protection

beyond passwords. Many account providers

now offer additional ways for you verify who

you are before you conduct business on that

site.

• Make passwords long and strong: Combine

capital and lowercase letters with numbers

and symbols to create a more secure

password.

• Unique account, unique password: Separate

passwords for every account helps to thwart

cybercriminals.

• Write it down and keep it safe: Everyone

can forget a password. Keep a list that’s

stored in a safe, secure place away from your

computer.

• Own your online presence: When available,

set the privacy and security settings on

websites to your comfort level for information

sharing. It’s ok to limit who you share

information with.

Connect With Care

• When in doubt, throw it out: Links in email,

tweets, posts, and online advertising are

often the way cybercriminals compromise

your computer. If it looks suspicious, even if

you know the source, it’s best to delete or if

appropriate, mark as junk email.

• Get savvy about Wi-Fi hotspots: Limit the

type of business you conduct and adjust the

security settings on your device to limit who

can access your machine.

• Protect your $$: When banking and shopping,

check to be sure the site is security enabled.

The first step is STOP. THINK. CONNECT.

LI S

6